• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 760
Next 10 →

A Transformation System for Developing Recursive Programs

by R. M. Burstall, John Darlington , 1977
"... A system of rules for transforming programs is described, with the programs in the form of recursion equations An initially very simple, lucid. and hopefully correct program IS transformed into a more efficient one by altering the recursion structure Illustrative examples of program transformations ..."
Abstract - Cited by 649 (3 self) - Add to MetaCart
A system of rules for transforming programs is described, with the programs in the form of recursion equations An initially very simple, lucid. and hopefully correct program IS transformed into a more efficient one by altering the recursion structure Illustrative examples of program transformations

Dynamic programming algorithm optimization for spoken word recognition

by Hiroaki Sakoe, Seibi Chiba - IEEE TRANSACTIONS ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING , 1978
"... This paper reports on an optimum dynamic programming (DP) based time-normalization algorithm for spoken word recognition. First, a general principle of time-normalization is given using timewarping function. Then, two time-normalized distance definitions, ded symmetric and asymmetric forms, are der ..."
Abstract - Cited by 788 (3 self) - Add to MetaCart
This paper reports on an optimum dynamic programming (DP) based time-normalization algorithm for spoken word recognition. First, a general principle of time-normalization is given using timewarping function. Then, two time-normalized distance definitions, ded symmetric and asymmetric forms

A Taxonomy of Obfuscating Transformations

by Christian Collberg, Clark Thomborson, Douglas Low , 1997
"... It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this p ..."
Abstract - Cited by 313 (22 self) - Add to MetaCart
that is more difficult to understand and reverse engineer. The obfuscator is based on the application of code transformations, in many cases similar to those used by compiler optimizers. We describe a large number of such transformations, classify them, and evaluate them with respect to their potency (To what

Program Transformation in Calculational Form

by Akihiko Takano, Zhenjiang Hu, Masato Takeichi , 1998
"... Correctness-preserving program transformation has recently received a particular attention for compiler optimization in functional programming [Kelsey and Hudak 1989; Appel 1992; Peyton Jones 1996]. By implementing a compiler using many passes, each of which is a transformation for a particular opti ..."
Abstract - Cited by 5 (5 self) - Add to MetaCart
optimization, one can attain a modular compiler. It is no surprise that the modularity would increase if transformations are structured, i.e. constructed in a modular way. Indeed, the program transformation in calculational form (or program calculation) can help us to attain this goal.

Translation Validation for an Optimizing Compiler

by George C. Necula , 2000
"... We describe a translation validation infrastructure for the GNU C compiler. During the compilation the infrastructure compares the intermediate form of the program before and after each compiler pass and verifies the preservation of semantics. We discuss a general framework that the optimizer can us ..."
Abstract - Cited by 212 (7 self) - Add to MetaCart
We describe a translation validation infrastructure for the GNU C compiler. During the compilation the infrastructure compares the intermediate form of the program before and after each compiler pass and verifies the preservation of semantics. We discuss a general framework that the optimizer can

A PRACTICAL ALGORITHM for Exact Array Dependence Analysis

by William Pugh , 1992
"... A fundamental analysis step in advanced optimizing compiler (as well as many other software tools) is data dependence analysis for arrays. This means deciding if two references to an array can refer to the same element and if so, under what conditions. This information is used to deter-mine allowabl ..."
Abstract - Cited by 196 (0 self) - Add to MetaCart
-mine allowable program transformations and optimizations. For example, we can determine that in the following code fragment, no location of the array is both read and written. Once we also verify that no location is written more than once, we know that the writes can be done in any order. for i = 1 to 100 do

Link-Time Optimization of Address Calculation on a 64-bit Architecture

by Amitabh Srivastava, David W. Wall , 1994
"... Compilers for new machines with 64-bit addresses must generate code that works when the memory used by the program is large. Procedures and global variables are accessed indirectly via global address tables, and calling conventions include code to establish the addressability of the appropriate ..."
Abstract - Cited by 97 (14 self) - Add to MetaCart
tables. In the common case of a program that does not require a lot of memory, all of this can be simplified considerably, with a corresponding reduction in program size and execution time. We have used our link-time code modification system OM to perform program transformations related to global

Data Transmission by Frequency Division Multiplexing Using the Discrete Fourier Transform

by S. B. Weinstein , 1971
"... In this paper we present an innovative approach to on-line handwritten signature verification based on optimal feature representation (OFR) and neural-network-driven fuzzy reasoning (NND-FR); OFR is introduced here and is different from feature selection and generation. To create a reference signing ..."
Abstract - Cited by 148 (0 self) - Add to MetaCart
signing model of a person, a set of shape features and dynamic features are extracted from a set of original signatures. Subsequently, for each distinctive feature, an averaged prototype and a consistency function are calculated using genetic optimization, this procedure derived from our concept

Interior methods for nonlinear optimization

by Anders Forsgren, Philip E. Gill, Margaret H. Wright - SIAM REVIEW , 2002
"... Interior methods are an omnipresent, conspicuous feature of the constrained optimization landscape today, but it was not always so. Primarily in the form of barrier methods, interior-point techniques were popular during the 1960s for solving nonlinearly constrained problems. However, their use for ..."
Abstract - Cited by 127 (6 self) - Add to MetaCart
programming; in 1985, a formal connection was established between his method and classical barrier methods. Since then, interior methods have advanced so far, so fast, that their influence has transformed both the theory and practice of constrained optimization. This article provides a condensed, selective

Coil sensitivity encoding for fast MRI. In:

by Klaas P Pruessmann , Markus Weiger , Markus B Scheidegger , Peter Boesiger - Proceedings of the ISMRM 6th Annual Meeting, , 1998
"... New theoretical and practical concepts are presented for considerably enhancing the performance of magnetic resonance imaging (MRI) by means of arrays of multiple receiver coils. Sensitivity encoding (SENSE) is based on the fact that receiver sensitivity generally has an encoding effect complementa ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
and correlation are considered for the sake of SNR optimization. Optionally, the assessment of receiver noise may be skipped and the represents the superposition of pixels forming a Cartesian grid. In this example four of these pixels are in the full FOV; thus the actual degree of aliasing is four. Fast MRI 953
Next 10 →
Results 1 - 10 of 760
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University